DocumentCode :
2965927
Title :
Secure mobile code computing in distributed remote environment
Author :
Negm, Khaled E A ; Adi, Wael
Author_Institution :
Etisalat Coll. of Eng., Sharjah, United Arab Emirates
Volume :
1
fYear :
2004
fDate :
21-23 March 2004
Firstpage :
270
Abstract :
Mobile agent computing is an increasingly important paradigm which presents interesting new security challenges. Among these are the protection of host against malicious agents and protecting agents against hosts that execute agents. Especially of interest is the use of mobile agents in e-commerce settings, in which users release autonomous agents to roam around virtual stores and find desired products. In this research we investigated several schemes for dealing with assuring mapplets secure computation in a possible hostile environment without the need of special firewall or intrusion detection safe hardware. In this investigation we focus on realistic schemes which are feasible to implement. The presented mobile computing scheme do not require that the foreign host to be totally trustworthy that provides the same assurance as if the computation was carried using a traditional secure client/server model. The presented dynamical scheme is based on distribution of the algorithm on different hosts and making use of that the transactions has shared secrets by using the (k, n) secret-sharing threshold scheme. One of the positive outcomes of the current scheme is that it is distributed denial of service resistant system. The current proposed scheme presents a novel study of the tradeoff between the security and communication in remote computation. This formal study allows us to take the first step toward understanding the problem, indicating the significance of the various cryptographic assumptions, and as a result of the development of improved remote mobile computation schemes.
Keywords :
distributed programming; electronic commerce; mobile agents; mobile computing; security of data; telecommunication security; autonomous agents; cryptography; distributed remote environment; e-commerce; host protecting agents; intrusion detection safe hardware; malicious agents; mapplets secure computation; mobile agent computing; remote mobile computation; secret sharing threshold method; secure client-server model; secure mobile code computing; service resistant system; Autonomous agents; Communication system security; Computer crime; Distributed computing; Hardware; Intrusion detection; Mobile agents; Mobile communication; Mobile computing; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networking, Sensing and Control, 2004 IEEE International Conference on
ISSN :
1810-7869
Print_ISBN :
0-7803-8193-9
Type :
conf
DOI :
10.1109/ICNSC.2004.1297447
Filename :
1297447
Link To Document :
بازگشت